Keyphrases
Attacker
53%
Side Channel
46%
Side-channel Attacks
38%
Browser
35%
JavaScript
31%
Power Consumption
27%
World Wide Web
26%
RFID Tags
26%
Adversary
25%
Website Fingerprinting
24%
Software-based
22%
Smartphone
22%
Covert Channel
22%
Web Browser
21%
Network Applications
21%
Caching
21%
Remanence
19%
Fingerprinting
19%
Rowhammer Attack
18%
Cache Performance
17%
Internet of Things
17%
Mobile Phone
16%
Cache Side-channel Attacks
16%
Internet of Things Devices
16%
Network Traffic
15%
Electronic Voting
15%
User Privacy
14%
Router
14%
Attack Strategy
14%
Algebraic Side-channel Attack
13%
Traffic Characterization
13%
Cache Occupancy
13%
Browser Fingerprinting
13%
Browser Fingerprint
13%
Pseudo-Boolean Optimization
13%
Identification Method
13%
Fingerprinting Technique
13%
Smart Devices
13%
Device Identification
13%
Exfiltration
13%
Gyroscope
13%
Application Characterization
13%
Two-factor Authentication
13%
Jamming
13%
Public Key
13%
Effective Techniques
13%
Physically Unclonable Function
13%
Reverse Engineering
13%
Digital TV
13%
Cipher
12%
Computer Science
side-channel
100%
Attackers
67%
Side Channel
30%
Internet of Things
28%
Network Traffic
26%
Power Consumption
25%
Attack Model
21%
Tor Browser
20%
covert channel
19%
User Privacy
17%
Malicious Code
17%
Source Codes
15%
Internet of Things Device
15%
Attack Surface
14%
Password
13%
Side Channel Attack
13%
Identification Technique
13%
Device Identification
13%
Two-Factor Authentication
13%
Constraint Solver
13%
Smart Device
13%
Reverse Engineering
13%
Security Concern
13%
Potential Countermeasure
13%
public key
13%
Digital Television
13%
Firefox
13%
Supply Chain
12%
Javascript Code
12%
Public-Key Cryptography
11%
Machine Learning
11%
Software Configuration
10%
Hardware Configuration
10%
Hardware Component
10%
Computer Network
10%
Exploitation Technique
10%
Robot
10%
Individual User
9%
Collect Information
9%
Machine Learning Technique
9%
Classification Accuracy
9%
Power Analysis
9%
Memory Access
9%
Physical World
9%
Fault Injection
9%
Malware
9%
Wi-Fi
9%
Traffic Characterization
8%
Potential Attack
8%
Sensor Node
8%